US11546834B2 - Access barring method and apparatus and communication system - Google Patents

Access barring method and apparatus and communication system Download PDF

Info

Publication number
US11546834B2
US11546834B2 US16/393,429 US201916393429A US11546834B2 US 11546834 B2 US11546834 B2 US 11546834B2 US 201916393429 A US201916393429 A US 201916393429A US 11546834 B2 US11546834 B2 US 11546834B2
Authority
US
United States
Prior art keywords
parameters
parameter
access barring
related parameter
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US16/393,429
Other languages
English (en)
Other versions
US20190253953A1 (en
Inventor
Meiyi JIA
Yulong Shi
Hua Zhou
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Assigned to FUJITSU LIMITED reassignment FUJITSU LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: JIA, Meiyi, SHI, Yulong, ZHOU, HUA
Publication of US20190253953A1 publication Critical patent/US20190253953A1/en
Application granted granted Critical
Publication of US11546834B2 publication Critical patent/US11546834B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0289Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/02Hybrid access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0215Traffic management, e.g. flow control or congestion control based on user or device properties, e.g. MTC-capable devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Definitions

  • This disclosure relates to the field of communications, and in particular to an access barring method and apparatus and a communication system.
  • access class barring is an access barring mechanism based on a type of access attempt (such as data initiated by user equipment or signaling initiated by user equipment) and an access class (AC) to which terminal (UE, user equipment) belongs
  • ADC access class barring
  • MMTEL multimedia telephony
  • SMS multimedia telephony
  • SSC service-specific access control
  • EAB extended access barring
  • MTC machine type communication
  • NB-IoT narrow band Internet of Things
  • ACDC application-specific congestion control for data communication
  • the second group of the radio access network agrees to define a uniform access control mechanism for the NR, so as to process all cases and scenarios defined in the LTE, and process possible cases and/or scenarios in the future.
  • the uniform access control mechanism defined in RAN2 is applicable to all radio resource control (RRC) protocol states of the NR, such as an idle state (RRC_IDLE), a connected state (RRC_CONNECTED), and an inactive state (RRC_INACTIVE).
  • RRC radio resource control
  • embodiments of this disclosure provide an access barring method and apparatus and a communication system.
  • an access barring apparatus including:
  • a checking unit configured to perform access barring check or access class determination by using parameters defined for a new radio system.
  • an access barring method including:
  • a communication system including a network device and UE, the UE having the apparatus as described in the first aspect.
  • An advantage of the embodiments of this disclosure exists in that with the embodiments of this disclosure, selectable parameters are provided for a uniform access control mechanism defined by an NR, thereby simplifying an access mechanism, and ensuring all-directional compatibility of a terminal state.
  • FIG. 1 is a schematic diagram of an access barring technology in an LTE system
  • FIG. 2 is a schematic diagram of the access barring method of Embodiment 1;
  • FIG. 3 is a schematic diagram of the access barring apparatus of Embodiment 2;
  • FIG. 4 is a schematic diagram of the UE of Embodiment 2.
  • FIG. 5 is a schematic diagram of the communication system of Embodiment 3.
  • a base station may be referred to as an access point, a broadcast transmitter, a node B, or an evolution node B (eNB), etc., and may include some or all functions of them.
  • a mobile station or equipment may be referred to as user equipment (UE).
  • the UE may be fixed or mobile, and may also be referred to as a mobile station, a terminal, an access terminal, a user unit, or a station, etc.
  • the UE may be a cellular phone, a personal digital assistant (PDA), a wireless modem, a wireless communication device, a handhold device, a lap-top computer, a cordless telephone, and a vehicle, etc.
  • PDA personal digital assistant
  • FIG. 2 is a schematic diagram of the method. As shown in FIG. 2 , the method includes:
  • a UE performs access barring check or access class determination by using parameters defined for a new radio (NR) system.
  • NR new radio
  • possible parameters are defined for the uniform access control mechanism defined for the NR by RAN2.
  • control of access barring may be achieved by using one or two parameters only, thereby simplifying a procedure of access control, and being compatible with all states of the UE.
  • the parameters defined for the NR system are applicable to all states of the UE, such as the above-described idle state, the connected state and the inactive state.
  • a specific access barring mechanism may be selected without need of considering RRC states, that is, control of access barring may be achieved.
  • different RRC states may use identical parameters, or may use different parameters, and for identical parameters, identical values may be set, or different values may be set.
  • the parameters are identical or different, and when the parameters are identical, parameter values may be identical or different.
  • PLMNs and/or different network slicing may be differentiated by different parameters as needed, or may be differentiated by different parameter values of identical parameters, thereby further simplifying an access procedure.
  • the parameters are defined from angles of cases and scenarios.
  • the parameter may be UE-related parameter, or may be service-related parameter, or may be a combination of UE-related parameter and service-related parameter, that is, UE-related parameter and service-related parameter are all included.
  • the UE-related parameter here is, for example, parameters defined in consideration of the following factors, including but not limited to: a device type, such as a low-cost device, and a contracted service type, such as GSM, and M-zone.
  • the service-related parameter here is, for example, parameters defined in consideration of the following factors, including but not limited to: a service, such as voice, and video; an application, such as QQ initiation, Microsoft Service Network (MSN) initiation, and WeChat initiation; a call type, such as emergency call, and signaling initiated by a terminal; and quality of service (QoS) and/or a flow identifier (ID), etc.
  • a service such as voice, and video
  • an application such as QQ initiation, Microsoft Service Network (MSN) initiation, and WeChat initiation
  • a call type such as emergency call, and signaling initiated by a terminal
  • QoS quality of service
  • ID flow identifier
  • parameters possibly used in the uniform access control mechanism of the NR may be defined by using the above one parameter (a UE-related parameter or a service-related parameter) or two parameters (the UE-related parameter and the service-related parameter), and the UE may perform the access barring check or the access class determination by using the parameter(s), thereby simplifying the access mechanism.
  • the parameters are defined from angles of change and/or update.
  • the parameters may be static parameters, or may be dynamic parameters, or may be a combination of static parameters and dynamic parameters, that is, static parameters and dynamic parameters are all included.
  • the static parameters here refer to statically changed parameters; for example, they are parameters written into a subscriber identity module (SIM) and/or a universal subscriber identity module (USIM); for another example, they are parameters changed and/or updated only when operation administration and maintenance (OAM) indicates; for further example, they are parameters changed and/or updated only when an RRC state changes.
  • the dynamic parameters here are, for example, parameters changed and/or updated of an Internet protocol (IP) flow level.
  • IP Internet protocol
  • parameters possibly used in the uniform access control mechanism of the NR may be defined by using the above one parameter (a static parameter or a dynamic parameter) or two parameters (the static parameter and the dynamic parameter), and the UE may perform the access barring check or the access class determination by using the parameter(s), thereby simplifying the access mechanism.
  • the parameters are defined from an angle of model.
  • the parameters may be parameters provided by an upper layer, or may be parameters provided by an access stratum (AS), or may be a combination of parameters provided by an upper layer and parameters provided by an AS, that is, parameters provided by an upper layer and parameters provided by an AS are all included.
  • the parameters provided by an upper layer here are, for example, parameters provided by a non-access stratum (NAS) and/or an application layer.
  • the parameters provided by the AS here are, for example, parameters without indication provided by the upper layer.
  • parameters possibly used in the uniform access control mechanism of the NR may be defined by using the above one parameter (a parameter provided by an upper layer or a parameter provided by an AS) or two parameters (the parameter provided by an upper layer and the parameter provided by an AS), and the UE may perform the access barring check or the access class determination by using the parameter(s), thereby simplifying the access mechanism.
  • the parameters are defined from an angle of barring check.
  • the parameters may be bitmap-related parameters, or may be factor-related parameters, or may be a combination of bitmap-related parameters and factor-related parameters, that is, the bitmap-related parameters and the factor-related parameters are all included.
  • the network device may inform the UE of a corresponding bitmap; for example, for each bit, “0” denotes barring, and “1” denotes passing.
  • different RRC states may correspond to different bitmaps; however, the embodiment is not limited thereto.
  • each bit in the bitmap, each bit may correspond to one of the parameters or a combination of a plurality of parameters listed in the above three implementations, such as each UE-related parameter or each service-related parameter, or may be other parameters that are not listed, and the embodiment is not limited thereto, only if barring or passing of information corresponding to bits may be indicated via the bitmap.
  • the network device may define a factor between 0 and 1 according to a predetermined policy, such as a network congestion situation, and inform the UE of the factor.
  • the UE acquires a random number on its own, and if the random number is less than the factor, it is check as “passing”, otherwise, it is check as “barring”.
  • a factor may be provided for different UEs for use by them, or a factor may be provided for different services for use by them; however, the embodiment is not limited thereto.
  • the network device may define a factor 0.1 and inform the UE of the factor. And the UE generates a random number, and if the random number is less than 0.1, the UE may access to the network or transmit information and/or data to the network device. Hence, only 10% of the UEs is able to access to the network or transmit data to the network device.
  • the network device may define a factor 0.9 and inform the UE of the factor. And the UE generates a random number, and if the random number is less than 0.9, the UE may access to the network or transmit data to the network device. Hence, 90% of the UEs at most is able to access to the network or transmit information and/or data to the network device.
  • the parameters defined for the uniform access control mechanism of NR are described in the above four implementations by defining the parameters from different angles.
  • the above parameters may be used in input of the access barring mechanism, that is, access barring check may be performed by using the above parameters, so as to determine whether to transmit a request to the network (passing or barring); and in another implementation, the above parameters may be used as different dimensions of an access class, that is, an access class may be determined through any combination of the above parameters, and whether to transmit the request to the network (passing or barring) may be determined according to the access class, or other processing may be performed according to the access class.
  • how to perform access barring check by using the above defined parameters is not limited.
  • access barring check may be performed according only to the above parameters, or access barring check may be performed with reference to system information, which is dependent on particular implementation, and is not limited in the embodiment.
  • one of the parameters defined in the above four implementations may be used only, or the parameters defined in the above four implementations may be used in a combined manner, which is dependent on particular implementation, and is not limited in the embodiment.
  • the parameters defined in the above four implementations may be combined as a multi-dimensional parameter, so as to determine an access class.
  • a definition of the access class is not limited. For example, for the access class, following may be taken into account: 1) each access attempt in different RRC states is mapped into “an access class”; and 2) only “an access class” is taken into account in performing access barring check.
  • the definition of the access class it may be identical to that in existing standard, or a possible definition that is developed in the future may be employed.
  • the UE may determine a subsequent action according to a result of the check.
  • the UE may immediately bar, and does not transmit any request to the network device; or the UE may bar for a period of time, and transmit a request to the network device after the period of time passes, the period of time may be defined in protocols, or may be configured by the network.
  • the UE may immediately pass, and transmit a request to the network device; or the UE may pass after a period of time, that is, the UE transmits a request to the network device after the period of time; or the UE may pass when a certain condition is satisfied, that is, the UE transmits a request to the network device when the certain condition is satisfied, the period of time may be defined in protocols, or may be configured by the network, the condition may be defined in protocols, or may be configured by the network.
  • the UE may proceed with checking on parameters of the same class or all remained parameters or network-designated parameters. Hence, whether the access request is barred or permitted may be determined.
  • parameters possibly used in the uniform access control mechanism of NR may be defined by using one or two parameters, and the UE may use the parameter(s) to perform access barring check or access class determination, thereby simplifying the access mechanism.
  • the embodiment provides an access barring apparatus.
  • the implementation of the method in Embodiment 1 may be referred to for implementation of the apparatus, with identical contents being not going to be described herein any further.
  • FIG. 3 is a schematic diagram of the access barring apparatus.
  • an access barring apparatus 300 includes a checking unit 301 configured to perform access barring check or access class determination by using parameters defined for a new radio system.
  • the parameters defined for the NR system are applicable to all RRC states, different RRC states may use identical parameters, or may use different parameters, and for identical parameters, identical values may be set, or different values may be set. And for different public land mobile networks (PLMNs) and/or network slicing, the parameters may be identical or different, and when the parameters are identical, parameter values may be identical or different.
  • PLMNs public land mobile networks
  • PLMNs public land mobile networks
  • network slicing the parameters may be identical or different, and when the parameters are identical, parameter values may be identical or different.
  • the parameter may be UE-related parameter and/or service-related parameter
  • the checking unit 301 may perform the access barring check or the access class determination by using the UE-related parameter and/or the service-related parameter.
  • the UE-related parameter is defined according to one of the following or a combination thereof: a device type, and a contracted service type; and the service-related parameter is defined according to one of the following or a combination thereof: a service type, an application type, a call type, quality of service and/or a flow ID.
  • the parameters may be static parameters and/or dynamic parameters
  • the checking unit 301 may perform the access barring check or the access class determination by using the static parameters and/or and dynamic parameters.
  • the static parameters may include one of the following or a combination thereof: a parameter written into a subscriber identity module (SIM) and/or a universal subscriber identity module (USIM), a parameter changed and/or updated only when operation administration and maintenance (OAM) indicates, and a parameter changed and/or updated only when a radio resource control (RRC) state changes; and the dynamic parameters includes: a parameter changed and/or updated of an Internet protocol (IP) flow level.
  • SIM subscriber identity module
  • USB universal subscriber identity module
  • IP Internet protocol
  • the parameters may be parameters provided by an upper layer and/or parameters provided by an access stratum (AS), and the checking unit 301 performs the access barring check or the access class determination by using the parameters provided by the upper layer and/or the parameters provided by the AS.
  • AS access stratum
  • the parameters provided by the upper layer may include one of the following or a combination thereof: a parameter provided by an NAS, and a parameter provided by an application layer; and the parameters provided by the AS include: a parameter without indication provided by the upper layer.
  • the parameters may be bitmap-related parameters and/or factor-related parameters, and the checking unit 301 performs the access barring check or the access class determination by using the bitmap-related parameters and/or the factor-related parameters.
  • the apparatus 300 may further include a processing unit 302 configured to immediately bar or bar for a period of time when a result of the access barring check of the checking unit 301 is barring or suspending, and immediately pass or pass after a period of time or pass if a certain condition is satisfied when a result of the access barring check is passing or recovering.
  • a processing unit 302 configured to immediately bar or bar for a period of time when a result of the access barring check of the checking unit 301 is barring or suspending, and immediately pass or pass after a period of time or pass if a certain condition is satisfied when a result of the access barring check is passing or recovering.
  • the checking unit 301 may further proceed with performing access barring check on parameters of the same class or all remained parameters or network-designated parameters.
  • parameters possibly used in the uniform access control mechanism of NR may be defined by using one or two parameters, and the UE may use the parameter(s) to perform access barring check or access class determination, thereby simplifying the access mechanism.
  • the embodiment provides a UE, including the above-described access barring apparatus.
  • FIG. 4 is a schematic diagram of the UE 400 of the embodiment.
  • the UE 400 may include a processor 401 and a memory 402 , the memory 402 being coupled to the processor 401 .
  • this figure is illustrative only, and other types of structures may also be used, so as to supplement or replace this structure and achieve a telecommunications function or other functions.
  • the functions of the above-described access barring apparatus may be integrated into the processor 401 .
  • the processor 401 may be configured to: perform access barring check or access class determination by using parameters defined for a new radio system.
  • the above-described access barring apparatus and the processor 401 may be configured separately.
  • the access barring apparatus may be configured as a chip connected to the processor 401 , with its functions being realized under control of the processor 401 .
  • the UE 400 may further include a communication module 403 , an input unit 404 , a display 405 , and a power supply 406 . It should be noted that the UE 400 does not necessarily include all the parts shown in FIG. 4 , and furthermore, the UE 400 may include parts not shown in FIG. 4 , and the related art may be referred to.
  • the processor 401 is sometimes referred to as a controller or control, which may include a microprocessor or other processor devices and/or logic devices, and the processor 401 receives input and controls operations of every component of the UE 400 .
  • the memory 402 may be, for example, one or more of a buffer memory, a flash memory, a hard drive, a mobile medium, a volatile memory, a nonvolatile memory, or other suitable devices, which may store various information, and furthermore, store programs executing related information.
  • the processor 401 may execute programs stored in the memory 402 , so as to realize information storage or processing, etc. Functions of other parts are similar to those of the related art, which shall not be described herein any further.
  • the parts of the UE 400 may be realized by specific hardware, firmware, software, or any combination thereof, without departing from the scope of the present disclosure.
  • parameters possibly used in the uniform access control mechanism of NR may be defined by using one or two parameters, and the UE may use the parameter(s) to perform access barring check or access class determination, thereby simplifying the access mechanism.
  • the embodiment provides a communication system, including a network device and a UE.
  • FIG. 5 is a schematic diagram of the communication system of the embodiment.
  • the communication system 500 includes a network device 501 and a UE 502 ; wherein, the network device 501 may be base station, and combinations and functions of the base station are not limited in the embodiment; and the UE 502 may be the UE 400 described in Embodiment 2.
  • parameters possibly used in the uniform access control mechanism of NR may be defined by using one or two parameters, and the UE may use the parameter(s) to perform access barring check or access class determination, thereby simplifying the access mechanism.
  • An embodiment of the present disclosure provides a computer readable program, which, when executed in an access barring apparatus or a UE, will cause the access barring apparatus or the UE to carry out the access barring method as described in Embodiment 1.
  • An embodiment of the present disclosure provides a computer storage medium, including a computer readable program, which will cause an access barring apparatus or a UE to carry out the access barring method as described in Embodiment 1.
  • the above apparatuses of the present disclosure may be implemented by hardware, or by hardware in combination with software.
  • the present disclosure relates to such a computer-readable program that when the program is executed by a logic device, the logic device is enabled to carry out the apparatus or components as described above, or to carry out the methods or steps as described above.
  • the present disclosure also relates to a storage medium for storing the above program, such as a hard disk, a floppy disk, a CD, a DVD, and a flash memory, etc.
  • the method/apparatus described with reference to the embodiments of this disclosure may be directly embodied as hardware, software modules executed by a processor, or a combination thereof.
  • one or more functional block diagrams and/or one or more combinations of the functional block diagrams shown in FIG. 3 may either correspond to software modules of procedures of a computer program, or correspond to hardware modules.
  • Such software modules may respectively correspond to the steps shown in FIG. 1 .
  • the hardware module for example, may be carried out by firming the soft modules by using a field programmable gate array (FPGA).
  • FPGA field programmable gate array
  • the soft modules may be located in an RAM, a flash memory, an ROM, an EPROM, and an EEPROM, a register, a hard disc, a floppy disc, a CD-ROM, or any memory medium in other forms known in the art.
  • a memory medium may be coupled to a processor, so that the processor may be able to read information from the memory medium, and write information into the memory medium; or the memory medium may be a component of the processor.
  • the processor and the memory medium may be located in an ASIC.
  • the soft modules may be stored in a memory of a mobile terminal, and may also be stored in a memory card of a pluggable mobile terminal.
  • the soft modules may be stored in the MEGA-SIM card or the flash memory device of a large capacity.
  • One or more functional blocks and/or one or more combinations of the functional blocks in FIG. 3 may be realized as a universal processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware component or any appropriate combinations thereof carrying out the functions described in this application.
  • DSP digital signal processor
  • ASIC application-specific integrated circuit
  • FPGA field programmable gate array
  • the one or more functional block diagrams and/or one or more combinations of the functional block diagrams in FIG. 3 may also be realized as a combination of computing equipment, such as a combination of a DSP and a microprocessor, a plurality of processors, one or more microprocessors in communication combination with a DSP, or any other such configuration.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
US16/393,429 2017-03-15 2019-04-24 Access barring method and apparatus and communication system Active US11546834B2 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/076790 WO2018165909A1 (zh) 2017-03-15 2017-03-15 接入禁止方法、装置以及通信***

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/076790 Continuation WO2018165909A1 (zh) 2017-03-15 2017-03-15 接入禁止方法、装置以及通信***

Publications (2)

Publication Number Publication Date
US20190253953A1 US20190253953A1 (en) 2019-08-15
US11546834B2 true US11546834B2 (en) 2023-01-03

Family

ID=63522697

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/393,429 Active US11546834B2 (en) 2017-03-15 2019-04-24 Access barring method and apparatus and communication system

Country Status (4)

Country Link
US (1) US11546834B2 (zh)
JP (1) JP6798623B2 (zh)
CN (1) CN110249695A (zh)
WO (1) WO2018165909A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10863415B2 (en) * 2017-05-06 2020-12-08 Qualcomm Incorporated Unified access control
AU2017418624B2 (en) * 2017-06-15 2023-02-02 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Access control method and related product
CN110505672B (zh) * 2018-05-17 2020-12-15 华为技术有限公司 接入控制方法、通信设备以及基站

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3478286A (en) 1965-07-01 1969-11-11 Ibm System for automatically testing computer memories
US20090029698A1 (en) * 2007-07-25 2009-01-29 Research In Motion Limited Apparatus, and associated method, for facilitating mobile network selection by a gan-connected wireless device
CN102892173A (zh) 2011-07-22 2013-01-23 中兴通讯股份有限公司 一种业务被禁止发起或被释放后的处理方法及用户终端
CN103096495A (zh) 2011-11-03 2013-05-08 中兴通讯股份有限公司 一种接入控制方法和***
CN103096416A (zh) 2011-11-03 2013-05-08 中兴通讯股份有限公司 一种接入控制方法、装置及***
US8478286B1 (en) * 2012-01-31 2013-07-02 Renesas Mobile Corporation Method and apparatus of informing UE access barring
WO2013176121A1 (ja) 2012-05-22 2013-11-28 株式会社エヌ・ティ・ティ・ドコモ ネットワークアクセス規制方法、移動機及びプロセッサ
US20150141007A1 (en) * 2012-05-14 2015-05-21 Nokia Solutions And Networks Oy Extended access barring for CSG cells
WO2015148013A1 (en) 2014-03-24 2015-10-01 Intel IP Corporation Use of an oma management object to support application-specific congestion control in mobile networks
US20170201939A1 (en) * 2014-07-30 2017-07-13 Lg Electronics Inc. Method and apparatus for performing access control for wlan interworking in wireless communication system
US20180049258A1 (en) * 2015-03-24 2018-02-15 Lg Electronics Inc. Method and mtc device for performing mmtel service
US20180054760A1 (en) * 2015-03-12 2018-02-22 Lg Electronics Inc. Method and terminal for controlling network traffic in wireless communication system
US20180139783A1 (en) * 2015-05-26 2018-05-17 Samsung Electronics Co., Ltd Method and device for performing random access in wireless communication system
US20190364489A1 (en) * 2016-11-25 2019-11-28 Telefonaktiebolaget Lm Ericsson (Publ) Method and Apparatus for Controlling a Radio Access Connection to a Telecommunications Network
US20190387457A1 (en) * 2017-01-23 2019-12-19 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Access method, and terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761933B (zh) * 2011-04-29 2018-04-10 中兴通讯股份有限公司 Eab处理方法及装置、接入处理方法、装置及***
CN105165065B (zh) * 2013-05-03 2019-11-12 华为技术有限公司 接入控制方法及装置
CN110830227B (zh) * 2013-07-04 2022-08-19 韩国电子通信研究院 用于多连接性的方法
US9949271B2 (en) * 2014-03-06 2018-04-17 Mediatek Inc. Smart congestion control for RRC idle mode in LTE systems
CN105813134B (zh) * 2014-12-30 2020-01-03 杭州华为数字技术有限公司 频率优先级调整方法和装置

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3478286A (en) 1965-07-01 1969-11-11 Ibm System for automatically testing computer memories
US20090029698A1 (en) * 2007-07-25 2009-01-29 Research In Motion Limited Apparatus, and associated method, for facilitating mobile network selection by a gan-connected wireless device
CN102892173A (zh) 2011-07-22 2013-01-23 中兴通讯股份有限公司 一种业务被禁止发起或被释放后的处理方法及用户终端
CN103096495A (zh) 2011-11-03 2013-05-08 中兴通讯股份有限公司 一种接入控制方法和***
CN103096416A (zh) 2011-11-03 2013-05-08 中兴通讯股份有限公司 一种接入控制方法、装置及***
US8478286B1 (en) * 2012-01-31 2013-07-02 Renesas Mobile Corporation Method and apparatus of informing UE access barring
US20150141007A1 (en) * 2012-05-14 2015-05-21 Nokia Solutions And Networks Oy Extended access barring for CSG cells
US20150119060A1 (en) 2012-05-22 2015-04-30 Ntt Docomo, Inc. Method of barring network access, mobile device and processor
JP2013243598A (ja) 2012-05-22 2013-12-05 Ntt Docomo Inc ネットワークアクセス規制方法、移動機及びプロセッサ
WO2013176121A1 (ja) 2012-05-22 2013-11-28 株式会社エヌ・ティ・ティ・ドコモ ネットワークアクセス規制方法、移動機及びプロセッサ
WO2015148013A1 (en) 2014-03-24 2015-10-01 Intel IP Corporation Use of an oma management object to support application-specific congestion control in mobile networks
US20170201939A1 (en) * 2014-07-30 2017-07-13 Lg Electronics Inc. Method and apparatus for performing access control for wlan interworking in wireless communication system
US20180054760A1 (en) * 2015-03-12 2018-02-22 Lg Electronics Inc. Method and terminal for controlling network traffic in wireless communication system
US20180049258A1 (en) * 2015-03-24 2018-02-15 Lg Electronics Inc. Method and mtc device for performing mmtel service
US20180139783A1 (en) * 2015-05-26 2018-05-17 Samsung Electronics Co., Ltd Method and device for performing random access in wireless communication system
US20190364489A1 (en) * 2016-11-25 2019-11-28 Telefonaktiebolaget Lm Ericsson (Publ) Method and Apparatus for Controlling a Radio Access Connection to a Telecommunications Network
US20190387457A1 (en) * 2017-01-23 2019-12-19 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Access method, and terminal

Non-Patent Citations (9)

* Cited by examiner, † Cited by third party
Title
Catt, "Consideration on Access Control Mechanism", Agenda Item: 3.2.2 6, 3GPP TSG-RAN WG2 Meeting Ad Hoc, R2-1700216, Spokane, USA, Jan. 17-19, 2017.
Catt, "Consideration on Access Control Mechanism", Agenda Item: 3.2.2.6, 3GPP TSG-RAN WG2 Meeting Ad Hoc, R2-1700216, Spokane, USA, Jan. 17-19, 2017. (Year: 2017). *
First Notification of Office Action and Search Report issued by the China National Intellectual Property Administration for corresponding Chinese Patent Application No. 201780084770.0, dated Oct. 25, 2022, with an English translation.
Intel Corporation, "Considerations on the design aspects for NR access control", Agenda Item: 10.2.2.6, 3GPP TSG-RAN WG2 Meeting #97, R2-1701740 (revision of R2-1700349), Athens, Greece, Feb. 13-17, 2017.
International Search Report issued by the State Intellectual Property Office of the P R. China for corresponding International Patent Application No. PCT/CN2017/076790, dated Dec. 19, 2017, with an English translation.
Notice of Reasons for Refusal by the Japan Patent Office issued for corresponding Japanese Patent Application No. 2019-545782, dated Jul. 14, 2020, with English translation attached.
Written Opinion of the International Searching Authority issued by the State Intellectual Property Office of the P.R. China for corresponding International Patent Application No. PCT/CN2017/076790, dated Dec. 19, 2017, with an English translation.
Zte et al., "Consideration on the access control in NR", Agenda Item: 3.2.2 6, 3GPP TSG-RAN WG2 Meeting NR Ad Hoc, R2-1700151, Spokane, USA, Jan. 17-19, 2017.
ZTE et al., "Consideration on the access control in NR", Agenda Item: 3.2.2.6, 3GPP TSG-RAN WG2 Meeting NR Ad Hoc, R2-1700151, Spokane, USA, Jan. 17-19, 2017. (Year: 2017). *

Also Published As

Publication number Publication date
JP6798623B2 (ja) 2020-12-09
US20190253953A1 (en) 2019-08-15
CN110249695A (zh) 2019-09-17
WO2018165909A1 (zh) 2018-09-20
JP2020509692A (ja) 2020-03-26

Similar Documents

Publication Publication Date Title
US11678259B2 (en) Network slice selection method, terminal device, and network device
US10674363B2 (en) Access control method, user equipment, and network device
US11546834B2 (en) Access barring method and apparatus and communication system
KR20190016463A (ko) 접속 제어 방법 및 사용자기기
US20200084613A1 (en) Status switching method and apparatus
CN105659691A (zh) 用于服务请求过程的执行方法和用户设备
US11425764B2 (en) Communication method and communications apparatus for reporting establishment causes
US20160088545A1 (en) A node and method for small data communications
CN113170527B (zh) 方法、装置和计算机程序
US11405965B2 (en) Signaling processing method and apparatus
US11206580B2 (en) Communication method and communications apparatus
CN109891943B (zh) 一种接入控制的方法、设备及计算机可读介质
WO2021156347A1 (en) Guti reallocation for mt-edt
EP3914014A1 (en) Wireless communication method and device
CN114173384A (zh) QoS控制方法、装置及处理器可读存储介质
US11265922B2 (en) Method for accessing wireless local area network, terminal device, and network device
JP7367186B2 (ja) ページング方法と機器
US20220174645A1 (en) Service indication method and device
US20230102956A1 (en) Unified Access Control for a Cellular Network
CN113543157B (zh) 网络资源控制的方法及设备
US20210204193A1 (en) Access barring control
WO2019196842A1 (zh) 一种信令处理方法和装置
CN116349326A (zh) 无线通信方法、设备及存储介质

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: FUJITSU LIMITED, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JIA, MEIYI;SHI, YULONG;ZHOU, HUA;REEL/FRAME:049003/0424

Effective date: 20190329

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE